SSLDecryptTypesofHackersRecoverLeastPrivilegeAssetManagementPhishingFirewallSecurePasswordDetectPassPhaseSpearPhishingPatchManagementDataDiscoveryTwo-FactorAuthenticationAdvancedPersistentThreatSecureEmailSecurityAwarenessTrainingRiskAssessmentIdentifyRespondAntivirusProtectMalwareVPNSSLDecryptTypesofHackersRecoverLeastPrivilegeAssetManagementPhishingFirewallSecurePasswordDetectPassPhaseSpearPhishingPatchManagementDataDiscoveryTwo-FactorAuthenticationAdvancedPersistentThreatSecureEmailSecurityAwarenessTrainingRiskAssessmentIdentifyRespondAntivirusProtectMalwareVPN

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. SSL Decrypt
  2. Types of Hackers
  3. Recover
  4. Least Privilege
  5. Asset Management
  6. Phishing
  7. Firewall
  8. Secure Password
  9. Detect
  10. PassPhase
  11. Spear Phishing
  12. Patch Management
  13. Data Discovery
  14. Two-Factor Authentication
  15. Advanced Persistent Threat
  16. Secure Email
  17. Security Awareness Training
  18. Risk Assessment
  19. Identify
  20. Respond
  21. Antivirus
  22. Protect
  23. Malware
  24. VPN